this script is intended for long term testing of reliability of network connection/connectivity it should quit after 24hours and thus not spamming the logs the script: #!/bin/bash # $1 = ip to test # $2 = how many hours to […]
short story: there is no “Menu” key on the t440 keyboard, (it does the same as clicking r-mouse-button, trackpad buttons can be cumbersome) hostnamectl; # tested on Operating System: Debian GNU/Linux 9 (stretch) Kernel: Linux 4.9.0-14-amd64 Architecture: x86-64 xev; # […]
if hfs+ is greyed out in gparted there is hfs+ compatibility software missing hint: sudo should be up and running, or gparted won’t be able to open a display (as root) and won’t be able to create partitions (as non […]
x11vnc is great, remmina is great (can scale the client window, no matter the vnc server resolution it will fit on the client screen) when the user followed the instructions here on how to setup vnc server on GNU Linux […]
“In June of this year, “Ripple20” (not only) shook the Internet of things: 19 vulnerabilities in a TCP/IP Stack for Embedded devices made “hundreds of millions” devices vulnerable, according to their discoverers. Now, Stack analysis by another team of researchers […]
hostnamectl; # tested on Static hostname: hpServerG6 Operating System: Debian GNU/Linux 10 (buster) Kernel: Linux 4.19.0-12-amd64 Architecture: x86-64 su – root; apt update; apt install qemu-kvm libvirt-clients libvirt-daemon-system bridge-utils virtinst libvirt-daemon virt-manager usermod -a -G libvirt user; # give user […]
to recover the data: how to mount luks2 encrypted volume possibility: remove harddisk, attach to sata2usb adapter, then mount on different machine like this: # unlock encrypted harddisk udisksctl unlock -b /dev/sdb5 udisksctl mount -b /dev/mapper/ubuntu–vg-root Mounted /dev/dm-1 at /media/dpm/e8cf82c0-f0a3-41b3-ab28-1f9d23fcfa72 […]
btw: love kvm (used by very large companies) just as virtualbox (oracle) the task: over the years a windows vm is using up massive amounts of precious server harddisk space (snapshots before everyupdate) all the snapshots now add up to […]
update: while this benchmark is still valid, very simple, very cross platform, with a focus on the team cpu (why is there no multi core md5? (putting many many core arm servers at disadvantage) + harddisk (two very important components) […]
Overview Recent 360Netlab unknown threat detection system to capture to a group of unknown malicious families of the sample, which a number of samples supported CPU architectures are x86(32/64), ARM(32/64), MIPS(MIPS32/MIPS-III) as well as PPC, after our analysis, which is […]
“Better Than Nothing” Starlink-Beta started across the US & Canada Starlink: amazing but and also a bit “crazy” “On 15 October 2019, the United States Federal Communications Commission submitted filings to the International Telecommunication Union on SpaceX’s behalf to […]
contains advertisement. to be honest, it is hard to keep up the speed at which cyber incidents are reported. here is the latest take on “Russian IT Sec Updates”. have phun! SecurityLab, [28.09.20 08:20] Last month, TikTok developers rolled […]
(plain) text is (still) the universal “interface” or “format” processing, viewing, diffing text is important to stop small changes in otherwise extensive and identical config files. the heavy weight eclipse gui diff: an optical nice diff brings the otherwise slow […]
mocp –version This is : Music On Console Version : 2.6-alpha3 Built : Nov 27 2016 10:55:04 Compiled with : OSS ALSA JACK DEBUG Network streams resample Running on : Linux 4.9.0-13-amd64 x86_64 Author : Damian Pietras Homepage : http://moc.daper.net/ […]
Connection refused nothing has changed on server or client side so was the server hacked? NO! the solution is way more simple: the guest wifi might block ssh traffic give it a try: if not even telnet can get at […]
JavaScript can compromise the user’s network devices! pretty evil are devices/routers with security problems, that can be exploited from javascript. so basically opening a webpage with a browser that has javascript enabled (which most browsers have) might scan the user’s […]
finally summer and climate change have both reached Europe and had several weeks of 30 C straight… without ventilation, anything above 30 is just “too much to think” (so maybe the brain CPU also would need active cooling?) of course […]
SecurityLab, [14.07.20 15:35] The Electronic Frontier Foundation (EFF) has unveiled a new database demonstrating how and where us law enforcement agencies use tracking technologies. A map of the use of tracking technologies in the United States is presented (https://www.securitylab.ru/news/510018.php) SecurityLab, […]
first some praise: the maintainers of grub did their best they could to bring about a great piece of software, no doubt about that. the question is: could less be more? when Greg Kroah-Hartman (can’t find the source) suggested to […]
the for loop when the user wants a command to be run exactly x times for i in $(seq 1 5); do echo $i; done # for example generate a file with 1 million lines # and messure the time […]
second take on trying to get a xmpp server (OpenFire, Java) client (Pidgin, C (C#, Perl, Python, Tcl are used for plugins)) up and running. at least this time with partial luck (was able to login via pidgin) but it […]
the nice: NAT is nice as it provides some form of protection/shielding of vms from the internet, by placing the host between (doing all the fire walling) the problem: server is exposed to regular dovecot and exim password bruteforce attempts, […]
versus is the wrong word. They are both great great GNU Linux distributions with a different focus and imho the perfect combination. Debian (apt based) “the universal operating system” (because has great hardware compatibility amd64 (64Bit intel) arm64 armel armhf […]
guess with it-security and internet-security (internet = roads, cars = computers that users use every day) it is like with real-life-security – there is no 100% security. all users of a system are in constant potential danger of having an […]
git was initially written by Linus Torvalds on the idea: how to create source code management system that does not suck. source code management is very useful when the developer team is larger than > 1 developer. it allows fast […]
https://theintercept.com/2020/04/03/zooms-encryption-is-not-suited-for-secrets-and-has-surprising-links-to-china-researchers-discover/ hm…. let me think where one has seen this before: TELEGRAM! Zoom’s service is “not suited for secrets” “The researchers also found that Zoom protects video and audio content using a home-grown encryption scheme, that there is a vulnerability […]
Videos: ssh thanks for sharing even when the audio is pretty crappy. slides (hard to read on video) can be found here: https://degabriele.info/slides/SSH_CCS_16.pdf “dropbear” is ambedded ssh server Made in Australia (wiki) also available as Android App naming: a “dropbear” […]
this really raises the question: the mobile (complete computer) phone (number) as key to everything? is it a good idea to rely on smart phones (that are essentially a very small laptop and a cellular modem) and phone numbers to […]
hostnamectl; # tested on Icon name: computer-desktop Chassis: desktop Operating System: Debian GNU/Linux 10 (buster) Kernel: Linux 4.19.0-8-amd64 Architecture: x86-64 su – root; # become root apt update apt install rfkill rfkill list all 0: phy0: Wireless LAN Soft blocked: […]
the “perb” seems to be SELinux “missing context”. hostnamectrl; # tested on CentOS Linux 7 (Core) Kernel: Linux 3.10.0-1062.12.1.el7.x86_64 # with latest updates as available in 2020-02 As told above, try first: setenforce 0; # temporarily disable SELinux, can files […]